15 Jun 2020

Microsoft Joins Ban on Sale of Facial Recognition Tech to Police

Microsoft has reportedly joined Amazon and IBM in blocking the sale of its facial recognition technology to law enforcement, pushing for federal laws that adequately address the issues present in the software and regulate the technology. On Thursday, Microsoft stated that the ban on facial recognition gear will stand until

Read More
22 Apr 2020

RCE Exploit Released for IBM Data Risk Manager, No Patch Available

IBM has not yet patched four serious security vulnerabilities that lie in the IBM Data Risk Manager (IDRM). The vulnerabilities can lead to unauthenticated remote code execution (RCE), according to an analysis from Agile Information Security. A proof-of-concept exploit is also available for version 2.0.3. IDRM serves as a software

Read More
31 Mar 2020

Zeus Sphinx Banking Trojan Arises Amid COVID-19

After three years, the Zeus Sphinx banking trojan has returned to the cybersecurity scene amid the global pandemic, aiming to capitalize on government relief efforts. According to two researchers at IBM X-Force, Amir Gandler and Limor Kessem, the trojan began resurfacing in December, however, there has been a significant increase

Read More
31 Mar 2020

Coronavirus-themed spam surged 14,000% in two weeks says IBM

Recently, there have been numerous reports of cybercriminals and hacking groups taking advantage of the COVID-19 pandemic. IBM emerged with new information that stated that in the past two weeks, coronavirus themed spam has increased by 14,000%. The report by IBM’s X-Force reveals how much spam has been generated, taking

Read More
05 Dec 2019

Iran Has Launched ‘Malicious’ New Malware That Wipes Windows Computers, Warns IBM

IBM found that state-sponsored hacking group APT34 has deployed a new strain of malicious malware aimed at the industrial and energy sectors in the Middle East. APT34 was responsible for a phishing attack using LinkedIn earlier this year, but IBM claims that they are working with another group whose identity

Read More
12 Sep 2019

The Executive’s Guide To Quantum Computing: What you need to know for your strategy today

This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal, inform you about the near future so you can make the right changes to your strategy today. After a review of some key quantum computing concepts we will provide an update on some of the most promising research initiatives and key use cases being explored. We then conclude with insights you can use for your strategic approach and a list of resources for further research.

Read More
15 Nov 2018

These Companies Are Pitching AI to the U.S. Military

“While Silicon Valley workers continue to protest their employers selling artificial intelligence products to the U.S. military, the U.S. military is still looking to spend money on AI. The Army Research Lab, the Project Maven team, and the Defense Department’s Joint Artificial Intelligence Center will host technology companies later this month in

Read More
27 Jul 2018

Bidding Begins for Pentagon’s Controversial $10 Billion War Cloud

The DoD is now accepting proposals for its 10-year, $10 billion Joint Enterprise Defense Infrastructure (JEDI) cloud contract, to be awarded to a single provider. The controversial contract will make a commercial company responsible for important workloads and classified military secrets accessible around the globe “in a single war cloud.”

Read More
11 Jun 2018

America’s Most Powerful Supercomputer Unveiled by Energy Department

The Department of Energy’s new supercomputer is now the fastest supercomputer in the country, and possibly the entire world. In one hour, the computer can solve a problem that would take the typical PC 30 years to complete. Taking over 5 years and 280 million USD to build, the computer

Read More
18 May 2018

Is Quantum Computing Ushering in an Era of No More Secrets?

In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has created such a powerful secret breaking device that

Read More